280 likes | 405 Views
Exploiting the Robustness on Power-Law Networks Yilin Shen , Nam P. Nguyen, My T. Thai Presented by : Yilin Shen Dept. Computer Information Science and Engineering University of Florida. Outline. Motivation: Power-law Networks Models , Measurement and Threat Taxonomy
E N D
Exploiting the Robustness on Power-Law Networks • YilinShen, Nam P. Nguyen, My T. Thai • Presented by : • YilinShen • Dept. Computer Information Science and Engineering • University of Florida
Outline • Motivation: Power-law Networks • Models, Measurement and Threat Taxonomy • Power-Law Random Graph Model • Vulnerability Measurement • Threat Taxonomy • Preliminaries • Uniform Random Failures • Preferential Attacks • Degree-Centrality Attacks
Outline • Motivation: Power-law Networks • Models, Measurement and Threat Taxonomy • Power-Law Random Graph Model • Vulnerability Measurement • Threat Taxonomy • Preliminaries • Uniform Random Failures • Preferential Attacks • Degree-Centrality Attacks
Motivation: Power-Law Networks Main Property: The number of nodes having k connections is proportional to k-β β is a parameter whose value is typically in the range 1 <β < 4 Many Low Degree Nodes Few High Degree Nodes Internet in December 1998 http://cs.stanford.edu/people/jure/pubs/powergrowth-kdd05.ppt 4
More Real Network Examples • Many large-scale real-world networks appear to exhibit a power-law graph • Internet: β = 2.1 • World Wide Web: β = 2.1 • Social Networks: β = 2.3 • Protein-protein interaction networks: β = 2.5
Outline • Motivation: Power-law Networks • Models, Measurement and Threat Taxonomy • Power-Law Random Graph Model • Vulnerability Measurement • Threat Taxonomy • Preliminaries • Uniform Random Failures • Preferential Attacks • Degree-Centrality Attacks
() Power-law Graph Definition(() Graph G()):
Power-Law Random Graph Model • Form a set L containing dv disjoint copy of vertex v (mini-vertices); • Choose a random matching of the elements of L; • For two vertices u and v, there is an edge between them if and only if at least one edge of the random perfect matching was connecting copies of u to copies of v.
Outline • Motivation: Power-law Networks • Models, Measurement and Threat Taxonomy • Power-Law Random Graph Model • Vulnerability Measurement • Threat Taxonomy • Preliminaries • Uniform Random Failures • Preferential Attacks • Degree-Centrality Attacks
Vulnerability Measurement Total Pairwise Connectivity P (in residual power-law networks after the failures and attacks) Why is Total Pairwise Connectivity an effective measurement? It can control the balance among disconnected components while ensuring the nonexistence of giant components.
Outline • Motivation: Power-law Networks • Models, Measurement and Threat Taxonomy • Power-Law Random Graph Model • Vulnerability Measurement • Threat Taxonomy • Preliminaries • Uniform Random Failures • Preferential Attacks • Degree-Centrality Attacks
Threat Taxonomy • Uniform Random Failure • Each node in G() fails randomly with the same probability p • Preferential Attack • Each node in G() is attacked with higher probability if it has a larger degree • Degree-Centrality Attack • The adversary only attacks the set of centrality nodes with maximum degrees in G()
Outline • Motivation: Power-law Networks • Models, Measurement and Threat Taxonomy • Power-Law Random Graph Model • Vulnerability Measurement • Threat Taxonomy • Preliminaries • Uniform Random Failures • Preferential Attacks • Degree-Centrality Attacks
Two Lemmas in Literature M. Molloy and B. Reed (1995)
Two Lemmas in Literature (Cont.) F. Chung et al. (2002)
Some Fundamental Results • Relations between largest connected component and total pairwise connectivity • Robustness of power-law networks
Outline • Motivation: Power-law Networks • Models, Measurement and Threat Taxonomy • Power-Law Random Graph Model • Vulnerability Measurement • Threat Taxonomy • Preliminaries • Uniform Random Failures • Preferential Attacks • Degree-Centrality Attacks
The Idea of Proof • Compute the expected degree distribution of graph Gr • Use M. Molloy and B. Reed (1995) to find a threshold β0 • When ββ0, we use the branching process method
Visualization • The power-law networks are extremely robusteven when the failure probability is unrealistically large • Even though PLN is affected, the number of node-pairs after failure is close to original PLN • Smaller β is better
Outline • Motivation: Power-law Networks • Models, Measurement and Threat Taxonomy • Power-Law Random Graph Model • Vulnerability Measurement • Threat Taxonomy • Preliminaries • Uniform Random Failures • Preferential Attacks • Degree-Centrality Attacks
Interactive Preferential Attacks • By choosing a different parameter β′, a node of degree i in G(α,) has probability to be attacked • Main Theorem.
Expected Preferential Attacks • To attack the expected c nodes • A node of degree i is attacked with probability • Main Theorem.
Visualization • Power-Law Networks will not be affected only when under around expected 13% of nodes are attacked • Smaller βis better
Outline • Motivation: Power-law Networks • Models, Measurement and Threat Taxonomy • Power-Law Random Graph Model • Vulnerability Measurement • Threat Taxonomy • Preliminaries • Uniform Random Failures • Preferential Attacks • Degree-Centrality Attacks
Degree-Centrality Attacks • The intruders intentionally attack the “hubs”, that is, the set of nodes with highest degrees (larger than x0) • Main Theorem.
Visualization • Power-Law Networks will not be affected only when under 5% of degree-centrality nodes are attacked • Smaller βis better